Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31-05-2024 11:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http:///home/petik/shadowserver/malware/2024-05-31_68d7d9360851a5701412fd6729af26e9_bkransomware
Resource
win10v2004-20240426-en
General
-
Target
http:///home/petik/shadowserver/malware/2024-05-31_68d7d9360851a5701412fd6729af26e9_bkransomware
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2988 msedge.exe 2988 msedge.exe 1976 msedge.exe 1976 msedge.exe 868 identity_helper.exe 868 identity_helper.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2216 1976 msedge.exe 82 PID 1976 wrote to memory of 2216 1976 msedge.exe 82 PID 1976 wrote to memory of 1020 1976 msedge.exe 84 PID 1976 wrote to memory of 1020 1976 msedge.exe 84 PID 1976 wrote to memory of 1020 1976 msedge.exe 84 PID 1976 wrote to memory of 1020 1976 msedge.exe 84 PID 1976 wrote to memory of 1020 1976 msedge.exe 84 PID 1976 wrote to memory of 1020 1976 msedge.exe 84 PID 1976 wrote to memory of 1020 1976 msedge.exe 84 PID 1976 wrote to memory of 1020 1976 msedge.exe 84 PID 1976 wrote to memory of 1020 1976 msedge.exe 84 PID 1976 wrote to memory of 1020 1976 msedge.exe 84 PID 1976 wrote to memory of 1020 1976 msedge.exe 84 PID 1976 wrote to memory of 1020 1976 msedge.exe 84 PID 1976 wrote to memory of 1020 1976 msedge.exe 84 PID 1976 wrote to memory of 1020 1976 msedge.exe 84 PID 1976 wrote to memory of 1020 1976 msedge.exe 84 PID 1976 wrote to memory of 1020 1976 msedge.exe 84 PID 1976 wrote to memory of 1020 1976 msedge.exe 84 PID 1976 wrote to memory of 1020 1976 msedge.exe 84 PID 1976 wrote to memory of 1020 1976 msedge.exe 84 PID 1976 wrote to memory of 1020 1976 msedge.exe 84 PID 1976 wrote to memory of 1020 1976 msedge.exe 84 PID 1976 wrote to memory of 1020 1976 msedge.exe 84 PID 1976 wrote to memory of 1020 1976 msedge.exe 84 PID 1976 wrote to memory of 1020 1976 msedge.exe 84 PID 1976 wrote to memory of 1020 1976 msedge.exe 84 PID 1976 wrote to memory of 1020 1976 msedge.exe 84 PID 1976 wrote to memory of 1020 1976 msedge.exe 84 PID 1976 wrote to memory of 1020 1976 msedge.exe 84 PID 1976 wrote to memory of 1020 1976 msedge.exe 84 PID 1976 wrote to memory of 1020 1976 msedge.exe 84 PID 1976 wrote to memory of 1020 1976 msedge.exe 84 PID 1976 wrote to memory of 1020 1976 msedge.exe 84 PID 1976 wrote to memory of 1020 1976 msedge.exe 84 PID 1976 wrote to memory of 1020 1976 msedge.exe 84 PID 1976 wrote to memory of 1020 1976 msedge.exe 84 PID 1976 wrote to memory of 1020 1976 msedge.exe 84 PID 1976 wrote to memory of 1020 1976 msedge.exe 84 PID 1976 wrote to memory of 1020 1976 msedge.exe 84 PID 1976 wrote to memory of 1020 1976 msedge.exe 84 PID 1976 wrote to memory of 1020 1976 msedge.exe 84 PID 1976 wrote to memory of 2988 1976 msedge.exe 85 PID 1976 wrote to memory of 2988 1976 msedge.exe 85 PID 1976 wrote to memory of 2888 1976 msedge.exe 86 PID 1976 wrote to memory of 2888 1976 msedge.exe 86 PID 1976 wrote to memory of 2888 1976 msedge.exe 86 PID 1976 wrote to memory of 2888 1976 msedge.exe 86 PID 1976 wrote to memory of 2888 1976 msedge.exe 86 PID 1976 wrote to memory of 2888 1976 msedge.exe 86 PID 1976 wrote to memory of 2888 1976 msedge.exe 86 PID 1976 wrote to memory of 2888 1976 msedge.exe 86 PID 1976 wrote to memory of 2888 1976 msedge.exe 86 PID 1976 wrote to memory of 2888 1976 msedge.exe 86 PID 1976 wrote to memory of 2888 1976 msedge.exe 86 PID 1976 wrote to memory of 2888 1976 msedge.exe 86 PID 1976 wrote to memory of 2888 1976 msedge.exe 86 PID 1976 wrote to memory of 2888 1976 msedge.exe 86 PID 1976 wrote to memory of 2888 1976 msedge.exe 86 PID 1976 wrote to memory of 2888 1976 msedge.exe 86 PID 1976 wrote to memory of 2888 1976 msedge.exe 86 PID 1976 wrote to memory of 2888 1976 msedge.exe 86 PID 1976 wrote to memory of 2888 1976 msedge.exe 86 PID 1976 wrote to memory of 2888 1976 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http:///home/petik/shadowserver/malware/2024-05-31_68d7d9360851a5701412fd6729af26e9_bkransomware1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0xd8,0x7ffb6a6b46f8,0x7ffb6a6b4708,0x7ffb6a6b47182⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,5063056392660506476,16581213128009412337,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,5063056392660506476,16581213128009412337,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,5063056392660506476,16581213128009412337,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,5063056392660506476,16581213128009412337,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,5063056392660506476,16581213128009412337,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,5063056392660506476,16581213128009412337,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,5063056392660506476,16581213128009412337,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:12⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,5063056392660506476,16581213128009412337,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,5063056392660506476,16581213128009412337,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,5063056392660506476,16581213128009412337,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,5063056392660506476,16581213128009412337,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:12⤵PID:3748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,5063056392660506476,16581213128009412337,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,5063056392660506476,16581213128009412337,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,5063056392660506476,16581213128009412337,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1840 /prefetch:12⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,5063056392660506476,16581213128009412337,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1048 /prefetch:12⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,5063056392660506476,16581213128009412337,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4848 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1456
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1844
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
6KB
MD536d14a80bdb57a60b45487c8c1a0893d
SHA182cb71c8b67acadfc0cf838c6210be1d547066d3
SHA256d3f2e862913ccbe533dfb5b40252db029f022cc6c552f2e945070731fe061567
SHA5129320b4d853b2a4a4d689b8ec5627367202d1b416e21a7a870f8a4f11fb0657e5c4b8f555d125ae25c63194954464dc059cf6b547e8d2eb763cdd5953e2d2b19a
-
Filesize
5KB
MD56694da1ac3158b5752c6e4d278677bd8
SHA1e592ed0c04470af2d8b97638acdef8798bcf84cf
SHA25642e8829feb794f62ab483ee304baabd2e325ab8cb7aa1ecba9ca4e2cc99f43f8
SHA512ce3c52d7f7f43f8b5c91c7e28112a0bc5ffb052d6329920929d366d076abbcc653eeb93ea56df8b26dd4cdd849a2bc3e6245188cf437d7a92053d95a66712b07
-
Filesize
6KB
MD54b7c861aea6e20a22a83a2287acca1a3
SHA142631bf18d35c9aa5263dee3894c9ee78bb4da18
SHA256f14681313b2dc83627b2972db94345612a196a2f81e61d85ae3bc0343e5feda4
SHA5123180c94f46c838ba706887c0390ffe4219207a25a6113e3808077af4ca2dee7d7f01db62888d991ba904a6e52317e8c0658b25c7b3da6cfcdf35ce95f33cbd71
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD59d79f9eb5053f2413731232d33c856ac
SHA115dd6caf6429c8adc2dd423a23bae256437e9052
SHA2569a13de29cc29daf681a7ea060e74ecb5d78bd75a267f8270d18ddb2cfad23a09
SHA51213bd98a4a9aa74696bf1fa7bd97e473928ccb1cdd490c77ca8f45eb2f9b61e7c5e3425f1594a669d6f3c4c480d25df04e30cb112d553b2c1dd3897a626b77e65